{"id":"https://openalex.org/W4416323694","doi":"https://doi.org/10.1109/jiot.2025.3634343","title":"WaveMamba: Intrusion Detection in IoT Systems Using a Mamba Module With Embedded Wavelet Transform","display_name":"WaveMamba: Intrusion Detection in IoT Systems Using a Mamba Module With Embedded Wavelet Transform","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W4416323694","doi":"https://doi.org/10.1109/jiot.2025.3634343"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3634343","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3634343","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031904848","display_name":"Maoli Wang","orcid":"https://orcid.org/0000-0001-5420-1463"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Maoli Wang","raw_affiliation_strings":["School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109749109","display_name":"Xiangzhou Sun","orcid":"https://orcid.org/0009-0001-2440-3555"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangsen Sun","raw_affiliation_strings":["School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031904848"],"corresponding_institution_ids":["https://openalex.org/I202126657"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39258949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"3418","last_page":"3432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.510200023651123,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.510200023651123,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.2012999951839447,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.06840000301599503,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.6495000123977661},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.6216999888420105},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.6121000051498413},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6096000075340271},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5282999873161316},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4203999936580658},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.3961000144481659},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.390500009059906},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.38839998841285706}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7973999977111816},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.6495000123977661},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.6216999888420105},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.6121000051498413},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6096000075340271},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5282999873161316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4424999952316284},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.421099990606308},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4203999936580658},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40779998898506165},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.3961000144481659},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.390500009059906},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.38839998841285706},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.37439998984336853},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.36550000309944153},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35740000009536743},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.3467999994754791},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C199550912","wikidata":"https://www.wikidata.org/wiki/Q3238415","display_name":"Lifting scheme","level":5,"score":0.3156000077724457},{"id":"https://openalex.org/C95722684","wikidata":"https://www.wikidata.org/wiki/Q2622756","display_name":"Continuous wavelet transform","level":5,"score":0.29989999532699585},{"id":"https://openalex.org/C155777637","wikidata":"https://www.wikidata.org/wiki/Q2736187","display_name":"Wavelet packet decomposition","level":4,"score":0.29750001430511475},{"id":"https://openalex.org/C73339587","wikidata":"https://www.wikidata.org/wiki/Q1375942","display_name":"Stationary wavelet transform","level":5,"score":0.2922999858856201},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28209999203681946},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3634343","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3634343","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G108615431","display_name":null,"funder_award_id":"tstp20250724","funder_id":"https://openalex.org/F4320326185","funder_display_name":"Taishan Scholar Foundation of Shandong Province"},{"id":"https://openalex.org/G7239152786","display_name":null,"funder_award_id":"ZR2022MF353","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326185","display_name":"Taishan Scholar Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2166026200","https://openalex.org/W2789828921","https://openalex.org/W2979202956","https://openalex.org/W3159346561","https://openalex.org/W3163273607","https://openalex.org/W3164964481","https://openalex.org/W3197995211","https://openalex.org/W3206599325","https://openalex.org/W4281569056","https://openalex.org/W4308345673","https://openalex.org/W4310835597","https://openalex.org/W4311080744","https://openalex.org/W4312458394","https://openalex.org/W4313654696","https://openalex.org/W4317885086","https://openalex.org/W4320002750","https://openalex.org/W4323349130","https://openalex.org/W4388188747","https://openalex.org/W4388948449","https://openalex.org/W4389034394","https://openalex.org/W4391807504","https://openalex.org/W4392024455","https://openalex.org/W4394595954","https://openalex.org/W4399447058","https://openalex.org/W4401836426","https://openalex.org/W4401845853","https://openalex.org/W4403150406","https://openalex.org/W4404118847","https://openalex.org/W4405284526","https://openalex.org/W4406012094","https://openalex.org/W4406260895","https://openalex.org/W4406657357","https://openalex.org/W4407129833","https://openalex.org/W4408563962","https://openalex.org/W4408667555","https://openalex.org/W4409968148","https://openalex.org/W4410086792","https://openalex.org/W4410770896","https://openalex.org/W4410857897","https://openalex.org/W4414458684"],"related_works":[],"abstract_inverted_index":{"The":[0,87],"rapid":[1],"proliferation":[2],"of":[3,22,136,161],"diverse":[4],"IoT":[5,16,27,53,71],"scenarios":[6],"necessitates":[7],"intelligent":[8,162],"attack":[9,34,72,163],"detection":[10,73,164],"as":[11],"a":[12,69,80],"critical":[13],"safeguard":[14],"for":[15,83,157],"security.":[17,42],"However,":[18],"the":[19,105,129,159,166],"massive":[20],"volumes":[21],"heterogeneous":[23],"data":[24,55],"generated":[25],"by":[26],"devices,":[28],"coupled":[29],"with":[30],"increasingly":[31],"sophisticated":[32],"covert":[33],"vectors,":[35],"pose":[36],"significant":[37],"challenges":[38],"to":[39,56,132],"ensuring":[40],"robust":[41],"A":[43],"pivotal":[44],"challenge":[45],"lies":[46],"in":[47,119,165],"effectively":[48],"extracting":[49],"discriminative":[50],"features":[51],"from":[52],"device":[54],"accurately":[57],"classify":[58],"normal":[59],"and":[60,101,139],"malicious":[61],"activities.":[62],"To":[63],"address":[64],"this,":[65],"we":[66],"propose":[67],"WaveMamba,":[68],"novel":[70],"model":[74],"that":[75,146],"integrates":[76],"wavelet":[77,88,126],"transforms":[78],"into":[79,98],"Mamba-based":[81],"architecture":[82,131],"enhanced":[84],"feature":[85],"extraction.":[86],"transform":[89],"provides":[90],"superior":[91],"time-frequency":[92,137],"localization":[93],"capabilities,":[94],"decomposing":[95],"raw":[96],"signals":[97],"multi-scale":[99,140],"approximation":[100],"detail":[102],"coefficients.":[103],"Meanwhile,":[104],"Mamba":[106,130],"module,":[107],"built":[108],"upon":[109],"continuous":[110],"state-space":[111],"models":[112],"(SSMs),":[113],"excels":[114],"at":[115],"capturing":[116],"long-range":[117],"dependencies":[118],"sequential":[120],"data.":[121],"Our":[122],"framework":[123],"strategically":[124],"embeds":[125],"analysis":[127],"within":[128],"achieve":[133],"synergistic":[134],"fusion":[135],"representations":[138],"modeling":[141],"advantages.":[142],"Experimental":[143],"results":[144],"demonstrate":[145],"WaveMamba":[147],"significantly":[148],"outperforms":[149],"existing":[150],"methods.":[151],"This":[152],"advancement":[153],"holds":[154],"substantial":[155],"promise":[156],"elevating":[158],"precision":[160],"AI":[167],"era.":[168]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-18T00:00:00"}
